A vademecum on blockchain technologies: When, which, and how
Blockchain is a technology making the shared registry concept from distributed systems a
reality for a number of application domains, from the cryptocurrency one to potentially any …
reality for a number of application domains, from the cryptocurrency one to potentially any …
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …
privacy in computer and communication networks that use game-theoretic approaches. We …
SoK: Consensus in the age of blockchains
The core technical component of blockchains is consensus: how to reach agreement among
a distributed network of nodes. A plethora of blockchain consensus protocols have been …
a distributed network of nodes. A plethora of blockchain consensus protocols have been …
Secure multiparty computations on bitcoin
Is it possible to design an online protocol for playing a lottery, in a completely decentralized
way, that is, without relying on a trusted third party? Or can one construct a fully …
way, that is, without relying on a trusted third party? Or can one construct a fully …
Collusion-resilience in transaction fee mechanism design
Users bid in a transaction fee mechanism (TFM) to get their transactions included and
confirmed by a blockchain protocol. Roughgarden (EC'21) initiated the formal treatment of …
confirmed by a blockchain protocol. Roughgarden (EC'21) initiated the formal treatment of …
Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
Flexible byzantine fault tolerance
This paper introduces Flexible BFT, a new approach for BFT consensus solution design
revolving around two pillars, stronger resilience and diversity. The first pillar, stronger …
revolving around two pillars, stronger resilience and diversity. The first pillar, stronger …
A survey on the combined use of optimization methods and game theory
Game theory is a field of applied mathematics that studies strategic behavior of rational
factors. In other words, game theory is a collection of analytical tools that can be used to …
factors. In other words, game theory is a collection of analytical tools that can be used to …
[PDF][PDF] The blockchain consensus layer and BFT
In this paper, we analyze Blockchain consensus protocols in the lens of the foundations of
distributed computing. Our goal is to present analogies and connections between …
distributed computing. Our goal is to present analogies and connections between …
Aggregatable distributed key generation
In this paper, we introduce a distributed key generation (DKG) protocol with aggregatable
and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our …
and publicly-verifiable transcripts. Compared with prior publicly-verifiable approaches, our …